Asia's Source for Enterprise Network Knowledge

Friday, May 24th, 2019

Identity and access management

Credential stuffing

Access and identity

In the first six months of 2017, there were 2,227 breaches reported, exposing over 6 billion records and putting untold numbers of accounts at risk.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Protecting ‘identity’ perimeter without harming app experience

To streamline processes and make them user-friendly while also preventing attacks, you should also understand how apps enable user access and how apps can be compromised by attackers.

Why identity is the new perimeter for borderless businesses

 Since users no longer distinguish between remote access and on-premises access and they expect to connect from anywhere and on any device, network and security teams must ensure staff remains productive without putting the business or its data at risk. 

Study uncovers poor privileged account practices among Singapore companies

Study uncovers poor privileged account practices among Singapore companies

Almost six in ten organizations in Singapore are guilty of allowing third-party partners, contractors or vendors to access their privileged accounts.

The challenges and benefits of Identity and Access Management

The Challenges and Benefits of Identity and Access Management

Identity and access management (IAM) solutions must balance streamlined authentication with increasingly complex security concerns.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Why you should fear phishing more than data breaches

When it comes to account compromise, phishing poses a greater threat than data breaches, say researchers at Google and UC Berkeley.

Research reveals major 'snooping' problem in Singapore

Research reveals major ‘snooping’ problem in Singapore

An overwhelming majority of employees are deliberately seeking out information they are not permitted to access, exposing a major “snooping” problem among today’s workforce, according to a global survey conducted by Dimensional Research.

The ABCs of identity management

The ABCs of Identity Management

Identity management tools provide IT managers with tools and technologies for controlling user access to critical information within an organization.

9 biggest information security threats through 2018

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security threats over a two-year period. Here are the top nine threats to watch for through 2018.

EY bolsters APAC cyber-security business with Australian acquisition

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Professional services firm EY has entered into an agreement to acquire one of Oceania’s leading identity and access management (IAM) providers, Melbourne- based Open Windows Australia Pty Ltd.